Export Sessions to Excel Session Details Page
6.6.2 Add to Group from Details Pages
To add a sessions parameter to a group: 1. Select a row containing one or more session parameters user, Device ID, IP, and so on.2. Click the Add to Group button in the upper right corner.
The Add to Group dialog appears with the following search filters: 3. Select the group or create a new group. Figure 6–2 shows the dialog for adding a sessions parameter to an existing group. Table 6–4 Add to Group Dialog Filters Filter Description Group Name The name of the group. Groups for which the sessions parameter is not a member of are listed. Group Type The type of group. Groups for which the sessions parameter is not a member of are listed. Description The description of the group. Groups for which the session parameter is not a member of are listed. 6-8 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager Figure 6–2 Add to Existing Group Figure 6–3 shows the dialog for creating a group to add a sessions parameter to. Viewing Additional Details for Investigation 6-9 Figure 6–3 Create a New Group to Add Sessions Parameter to Enter the following information to create a group: When adding a group to an existing group, data from selected rows of the type the group can accept are added to the group. If any data is already in the group, an informational message is displayed. When creating a group to add the entity to, do not leave any fields blank; otherwise, an error occurs.4. Select Open this groups detail tab when done.
5. Click Add.
A confirmation dialog appears.6. Click OK to dismiss the confirmation dialog.
6.7 Session Details Page
The Session Details page consolidates information needed for fraud analysis. To go to the Session Details page:1. In the Search Results table, click the Session ID of the session of interest. The
Session Details page for that session is displayed. Table 6–5 Add to Group Fields Field Description Group Name The name of the group. Cache Policy Groups offer two Cache Policy options: Full Cache or None. By default, the Cache Policy should be set to all. For information, refer to Cache Policy . Group Type The type of group. Description Information about the group. 6-10 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager General details and all of the actions performed during the session are captured in the Session Details page. 2. View the details of the session.6.8 Looking at Events from a Higher Level with Session Details
A Session Details page displays an overview of the events that transpired during a particular session for fraud analysis. It contains: ■ General session data points such as user, device, location, and other details ■ A forensic record of the session, including transactions and checkpoints that were evaluated. Each checkpoint displays the policies in that checkpoint, alerts that were triggered during the session for that checkpoint, and the final action for that checkpoint. The policy explorer view is also available to provide additional details about policies, rules, and conditions.6.8.1 Policy Explorer
The Policy Explorer displays information about rules, conditions, trigger combinations, group linking, nested policies, and other items. Figure 6–4 Policy Explorer Rule Details Details about the rule is shown in the Policy Explorer. The session results display the scores and results of that rule. Viewing Additional Details for Investigation 6-11 Pre-conditions Pre-conditions for that rule is displayed in the details panel. The session results show the confidence factors and other values for the pre-conditions for that session. Conditions The values for the condition parameters are displayed. The session results show if the conditions returned true for this session evaluation. Trigger Combinations There is an option to view the triggered override combinations or view all overrides. Session results show the override information that was evaluated for this session including the nested policy information. Group Linking Group linking for the policy is displayed in the details panel.6.8.2 Runtime Information
The Session Details page contains several panels. The main panels like checkpoints and transactions have multiple subpanels. Panel are not displayed if information is not available. Except for the Session Details panel, all other panels are displayed in the order of execution. Looking at the Session Details page, you can see the flow of events, the sequence when the events happened within the session. Figure 6–5 Session Details with Checkpoint, Alerts, Actions, and Policies6.8.2.1 Session Details
The Session Details panel shows all the related information regarding the login transaction. It shows the authentication status, IP address from which the user logged in, user name, User ID, cookie information, autolearning processing status, and the login time. 6-12 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager6.8.2.2 Policies
A list of policies in that checkpoint are displayed in the Policies panel. You can view the rules and action that triggered. As an investigator, you are interested in why a particular rule triggered. For example, you might look at which policy and rules triggered the alert. Information can be gathered by looking at these details. For example, a user who successfully went through Pre-Authentication and Post-Authentication checkpoints knew the password and the questions and answers and there fore, there is a good chance that he is a valid user. On the other hand, a user who attempted to answer the questions twice and succeeded in providing a correct answer on his third attempt might be considered suspicious. This user did not know the answers right away so there is a chance that he may be a fraud trying out new answers. To view more details about the policy, you can launch the Policy Explorer using the icon on top of the panel or from any of the icons within the table. The policy link displays the Policy Details page and the rules link displays the Rule Details page. Only active and triggered rules are displayed. Only active policies are displayed. You have the option to view all the rules in the Policy Explorer. In the Policy Explorer, you can view the runtime values for each one of the policies and rules that were triggered. For example, if a rule triggered that showed that the user had logged in from a country that he did not usually log in from, you would want to look at the runtime details to see which country he logged in from. The Policy Explorer shows the policies that were triggered, the condition parameters, and the actual values.6.8.2.3 Transactions
The Transactions panel displays a list of transactions that were created. You can view the actual transaction data and the entity attribute values used in the transactions. For example, a fraud investigator analyzing a session can see that a user was blocked performing a transaction and that a particular rule was triggered, and he can also see the amount that was passed in and the account number that was used in the transaction. Transactions can be created within a checkpoint or without an associating checkpoint. If a Transaction ID is not provided as in the case of a transaction without an associating checkpoint, OAAM processes the last transaction in the session. The Table 6–6 Policies in a Checkpoint Item Description Name The name of the policies that are under the checkpoint, rules under the policies, the conditions under the rules, and the action triggered. Status Executed for policies and Triggered for rules. Scoring Engine A scoring engine is provided at the policy level and at the checkpoint level. The policy scoring engine is applied to rule scores to determine the risk for each policy. Time The time of the occurrence. Weight Percentage value used to influence the total score. Score Level of risk that has been calculated for specific situations or parts of a situation, expressed as a number. There are multiple policies under one checkpoint. The scores of these policies are used to determine a score for the checkpoint.Parts
» Oracle Fusion Middleware Online Documentation Library
» Benefits of Oracle Adaptive Access Manager
» Oracle Adaptive Access Manager Features
» Single Sign-On Integration Deployment Options
» Universal Installation Option Reverse Proxy Native Application Integration
» Web Services Application Integration
» Installation and Configuration 11g 11.1.1
» Setting Up the Oracle Adaptive Access Manager Base Environment
» 11g 11.1.1 Setting up Encryption
» Expand the WebLogic Domain icon in the Navigation tree in the left pane.
» Select OAAM domain and right-click and select the menu option Security, and
» Click oaam to select the map and then click Create Key.
» In the pop-up dialog make sure Select Map is oaam.
» Select the OAAM domain and right-click and select the menu option Security and
» Click OK to save the secret key to the Credential Store Framework.
» Expand the WebLogic Domain on the left pane, and select OAAM domain.
» From the OAAM Domain, select Security, and then Credentials.
» Expand oaam and select the symmetric key related entries associated with the
» Creating OAAM Users Configuring Database Credentials in the Credential Store Framework
» Open System Snapshot under Environment in the Navigation tree.
» Click the Load from File button.
» Deselect Back up current system now and click Continue.
» Browse for oaam_base_snapshot.zip and click the Load button to load the
» Enabling OTP Enabling Components and Features
» Values for the Common Timezones
» Signing In to Oracle Adaptive Access Manager 11g
» OAAM Admin Console and Controls
» Navigation Tree Structure Navigation Tree
» Navigation Tree Menu and Toolbar
» Navigation Panel Policy Tree
» Elements in the Search Form Search Results Table
» Search Results Menu and Toolbar Select All Create and Import
» Dashboard Online Help Close Multiple Tabs
» Export to Excel Close Multiple Tabs
» CSR Cases Oracle Fusion Middleware Online Documentation Library
» CSR and CSR Manager Role Permissions
» Getting Started Escalated Cases
» From the Cases Search page, specify criteria in the Search Filter.
» Viewing a List Cases You are Currently Working On
» From the Cases Search page, search by Case Status:
» From the Cases Search page, enter the description keyword to locate cases that
» Case Actions Case Details Page
» Viewing Case Details Viewing User Details
» Enter the search criteria and click Search.
» In the Cases Search page, search by the case status and by other filters to locate
» Enter search criteria and click Search.
» To search the sessions by Device ID, enter the ID of the device.
» Click Search. Searching for a Customers Sessions by Device ID or Date Range
» Click Search. Filtering the Session History by Authentication Status or Alert Level
» Click Search. Viewing Transactions in the Sessions History
» In the Cases Search page, click New Case. Select the Organization ID.
» From the Cases Search page, select a case by clicking in the checkbox next to case
» Enter a description in the Description field, or select a description from the
» From the Cases Search page, search for an existing case for resetting the image for
» In the User Item list, select Image. In the Notes list, select the note you want to add.
» Edit the note describing why you are taking the action, if necessary. Click Submit.
» From the Cases Search page, search for an existing case for resetting the virtual
» On the menu bar of the Case Details page, click Customer Resets.
» From the Cases Search page, search for an existing case for unlocking the OTP for
» On the menu bar of the Case Details page, click Customer Resets. Click Submit.
» From the Cases Search page, search for an existing case for resetting all
» On the menu bar of the Case Details page, select More Actions, and then click
» Open the Challenge Questions screen, as described in In the Item list, select Next Question.
» Open the Challenge Questions screen, as described in In the Item list, select Unlock Customer.
» Open the Challenge Questions screen, as described in In the Item list, select Ask Question.
» In the Notes list, select User Challenged. Click Submit. In the confirmation dialog, click OK.
» Enter the customers answer in the Answer field. Click Submit.
» Changing Case Status to Pending Closing a Case
» Access to Cases Multitenancy
» CSR Has Access to More Than One Organization ID Is Unable to Create Case
» CSR Has Access to More Than One Organization ID is able to Create Case Successfully
» CSR Who Cannot Access Any Organization Tries to Create Case
» CSR Searches Sessions Oracle Fusion Middleware Online Documentation Library
» Use Case: Customer Session Search and Case Creation
» In the Cases Search page, click the New Case button.
» For severity level, select Low from the Severity Level list
» Click OK to dismiss the confirmation message.
» To reset Henrys questions, in the Case Details page, select More Actions and
» In the Item list, select Reset Questions as the question-related action to
» In the Notes list, select Forgot QuestionAnswers.
» Click Submit to reset Henrys questions. Click OK to dismiss the dialog.
» Click Add Notes on the menu bar to add notes on the case. Click Submit. Click OK.
» In the Navigation tree, double-click Cases. The Cases Search page is displayed.
» Click Create. CSR Searches Cases
» Click OK in the Create Case confirmation dialog.
» In the menu bar of the Case Details page, select Customer Resets. The
» In the User Item list, select Image and Phrase.
» In the Notes list, select the type of note you want to add.
» In the Description field, modify the description to suit your needs.
» Click Submit. A confirmation dialog is displayed with the message that the
» In the confirmation dialog, click OK.
» In the menu bar, click More Actions, and then click Change Status.
» In the Expired field, select Show Only Expired.
» In the Case Type field, select CSR.
» Click Search Use Case: CSR Manager Bulk Case Edit
» Use Case: CSR - Ask Questions
» Best Practices and Recommendations
» Agent Cases Introduction and Concepts
» Fraud Investigation Role Permission
» Opening the Case Search Page Searching for Cases
» Linked Sessions Oracle Fusion Middleware Online Documentation Library
» Creating an Agent Case from an Escalation
» From the Cases Search page, select an Agent case by clicking in the checkbox next
» Click the Create Like button.
» Edit any of these fields if you want.
» Click Create. Creating a Case Like Another Agent Case
» In the Case Details page, click Add Notes. Click Submit.
» Click OK to dismiss the confirmation dialog.
» In the Case Details page, click More Actions and select Change Severity.
» Changing the Status of a Case Manually
» Configuring Auto Change for Case Status Closing a Case Manually
» On the Case Details page, click the Linked Sessions tab. Click the Link Sessions icon.
» From the results, select the sessions to link to this case and click Next.
» In the Case Details page, click the Linked Sessions tab.
» Select the linked sessions you want and click Export.
» Agent Case Feedback Closing Multiple Cases
» An Investigator, demoinvest1 logs in to the system.
» Investigation Workflow Scenario - Blocked Login Attempts
» Investigation Workflow for CSR Escalated Agent Cases
» Fraud Investigator opens the OAAM Admin Console and sees only the
» Fraud Investigator creates a case.
» Fraud Investigator links the session.
» Fraud Investigator repeats steps 2 and 3 as required
» Fraud Investigator changes the case status to attention required.
» Fraud Investigator adds notes.
» Investigation Workflow for Auto-Created Cases
» How Users Use Agent Cases for Investigation
» Associating Fraud Sessions with a Case for Investigation
» Listing the Cases that I Am Currently Working With Closing a Case
» Closing Multiple Cases Auto-Status Change Escalated Cases
» Configuring Agent Case Access Best Practices and Recommendations
» Details Pages Overview Details Page Structure
» View Transactions in Session Details
» Searching for Sessions Closing Multiple Cases
» Click the Add to Group button in the upper right corner.
» Export Sessions to Excel Session Details Page
» Policy Explorer Looking at Events from a Higher Level with Session Details
» Session Details Oracle Fusion Middleware Online Documentation Library
» Policies Oracle Fusion Middleware Online Documentation Library
» Investigation and the Importance of Details Pages
» User Details: Alerts Tab User Details: Fingerprint Data
» View statistics about the user
» Search and view the different user groups with which a user is associated
» Search and view all the alerts triggered and generated for the user
» View the rules run on the user
» Search and view the fingerprints created for the user
» Location Details: Summary Tab
» Location Details: Groups Tab
» Location Details: Devices Tab
» Location Details: Alerts Tab
» Location Details: Sessions Tab
» Location Details: Fingerprints Tab
» Location Country, State, City, or IP Details Tasks
» View general information about the location
» Search and view the different location groups to which a location is associated or belongs
» Add location to existing location group
» Create a location group and add location to it
» Device Details: Users Tab Device Details: Locations Tabs
» Device Details: Alerts Tab Device Details: Sessions Tab
» Device Details: Fingerprint Data Tab
» Device Details Tasks Device Details Page
» View flash and browser fingerprint information created for the device
» Search and view the different device groups to which a device is associated or belongs
» AddRemove Device from a Device Group Create a device group and add device to it
» Fingerprint Details: Devices Tab Fingerprint Details: Locations Tab
» Fingerprint Details: Sessions Tab
» Fingerprint Details: Alerts Tab
» Search and view the different devices for which the fingerprint was used
» Search and view the different locations for which the fingerprint was used
» Alert Details: Locations Tab
» Alerts Details: Fingerprint Data
» Alert Details Tasks Alert Details Page
» View general information about the alert
» View alert groups with which an alert is associated
» Create an alert group and add an alert to it
» Search and view the different users for which the alert was generated
» Search and view the different devices for which the alert was generated
» Search and view the different locations for which the alert was generated
» In the Navigation tree, double-click Sessions.
» For Authentication Status, select Blocked and Locked.
» For Login Time, select the date and time, 24 hours ago, and the current date
» For Alert Level, select High.
» In the Sessions Search page, view the Search Results table.
» In the Navigation tree, double-click Cases. The Cases Search page is
» Enter Phillips user name into User Name field.
» In Search Results table, look for Temporary Allow in the Last Action Type
» Click the Case ID for the case that has Temporary Allow in the Last Action
» Use Case: Checking for Fraudulent Devices and Adding Them to a Group
» From Actions menu, select Export to Excel.
» Click Save File or Open with and click OK.
» Tom opens the user details for jsmith by clicking the link in the Session page. He
» Tom finds only two devices used by jsmith in the last six months in device page
» Tom searches for all of jsmiths sessions in the last three months. He finds almost
» Tom navigates to fingerprint details and finds that jsmith has logged in from the
» Use Case: Device and Location Details
» Use Case: IP Details and Adding to Group
» Double-click Sessions in the Navigation tree.
» Enter the IP range in the IP range fields and click Search.
» Use Case: Export Search Sessions Results - Export Page to Excel
» Knowledge Based Authentication Introduction and Concepts
» Challenge Response Process Introduction and Concepts
» Challenge Response Configuration Introduction and Concepts
» Registration Introduction and Concepts
» Challenge Questions Introduction and Concepts
» Question Set Introduction and Concepts
» Registration Logic Introduction and Concepts
» Answer Logic Introduction and Concepts
» Validations Failure Counters Introduction and Concepts
» KBA Resets Introduction and Concepts
» Reset Challenge Questions Oracle Fusion Middleware Online Documentation Library
» Reset Challenge Questions and the Set of Questions to Choose From
» Increment User to the Next Question
» Unlock a User Oracle Fusion Middleware Online Documentation Library
» Loading Challenge Questions Setting Up KBA Overview
» Setting Up KBA Setting Up KBA Overview
» Setting Up Challenge Setting Up KBA Overview
» Ensure Policies are Available
» Ensuring that KBA PropertiesDefault Properties are Set
» Ensure Challenge Questions are Available
» Navigate to the Questions Search page, as described in
» Specify criteria in the Search Filter to locate the questions and click Search.
» From the Questions Search page, click the question of interest in the Search
» In the Navigation tree, double-click Questions under KBA. The Questions Search
» From the Questions Search page, click the New Questions button.
» Type the new question in the Question field.
» From the Category list, select the category of question you want.
» In the Locale list, select the language you want.
» Click the Create Like icon. Type the new question in the Question field.
» In the Questions Search page, search for the questions you are interested in.
» Select the Export icon or Export from the Actions menu.
» In the Export dialog, click the Export button.
» Select the rows corresponding to the questions of interest and click Delete or select
» In the Questions Search page, search for the question you want to disable.
» Press the Deactivate button or select Deactivate from the Actions menu.
» Press the Activate button or select Activate from the Actions menu.
» In the Name field, enter the name you want for this instance of the validation
» Click Add. Adding a New Validation
» Navigate to the Validations page, as described in
» From the Validations page, select the hyperlinked configured validation you want
» In the Validation Parameter Details section, make the necessary changes. See
» Click Save Editing an Existing Validation
» Importing Validations Setting Up Validations for Answer Registration
» In the Validations page, search for the validations you are interested in.
» Select Export Selected from the Actions menu.
» When the Export dialog appears, select Save File, and then Save.
» Navigate to the Categories Search page, as described in
» Click Apply to save the changes or Revert to discard them.
» In the Categories Search page, search for the categories you want to delete.
» Select the rows corresponding to the categories you want and click Delete.
» Click OK to dismiss the dialog.
» In the Categories Search page, search for the categories you want to activate.
» In the Categories Search page, search for the categories you are interested in.
» Press the Deactivate button.
» Accessing Configurations in KBA Administration Configuring the Registration Logic
» About Answer Logic Adjusting Answer Logic
» Abbreviations Oracle Fusion Middleware Online Documentation Library
» Phonetics Keyboard Fat Fingering
» Abbreviation Fat Fingering Oracle Fusion Middleware Online Documentation Library
» Phonetics Oracle Fusion Middleware Online Documentation Library
» Customizing English Abbreviations and Equivalences
» Customizing Abbreviations and Equivalences for Locales
» KBA Question Edits KBA Answer Logic Edits
» Best Practices for Managing Questions
» Guidelines for Designing Challenge Questions
» Other Recommended Requirements KBA Guidelines and Recommended Requirements
» What is KBA? Multiple Word Answers
» Enabling Policies Multiple Word Answers
» Configuring Rules for Policies
» Configuring the Challenge Question Answer Validation
» Configuring the Answer Logic
» About Out-of-Band OTP Delivery How Does OTP Work?
» Challenge Type Multiple Word Answers
» KBA vs. OTP Multiple Word Answers
» Quick Start Multiple Word Answers
» Setup Overview Setting Up OTP Anywhere
» Install SOA Suite Oracle Fusion Middleware Online Documentation Library
» Log in to OAAM Admin with environment administrator privileges.
» Use Case 8: Register High Risk Lockout Use Case 9: High Risk Exclusion
» Use Case 10: OTP Challenge with Multi-Bucket Patterns
» Policies Introduction to Policies, Rules, and Conditions
» Rules Introduction to Policies, Rules, and Conditions
» Conditions Introduction to Policies, Rules, and Conditions
» Checkpoints Introduction to Policies, Rules, and Conditions
» Alerts and Alert Groups User Group Linking
» Evaluating a Policy within a Rule Scores and Weight
» Scoring Engine Introduction to Policies, Rules, and Conditions
» Import Policies Introduction to Policies, Rules, and Conditions
» Policy Type Introduction to Policies, Rules, and Conditions
» Failure Counters Introduction to Policies, Rules, and Conditions
» Planning Policies Configure the UMS Driver
» Overview of Creating a Policy
» Navigating to the Policies Search Page
» Viewing a Policy or a List of Policies Viewing Policy Details
» Creating Policies Configure the UMS Driver
» Navigate to the Policy Details page.
» In the Navigation tree, select Policies. The Policies Search page is displayed.
» Click the policy name to open its Policy Details page.
» Editing a Policys General Information
» Specifying General Rule Information
» Specifying Preconditions Starting the Rule Creation Process
» ActivateDisable Policies Reorder conditions
» Configuring Preconditions Adding Conditions
» Specifying Results for the Rule
» Deleting Policies Configure the UMS Driver
» Copying a Policy to Another Checkpoint
» Navigating to the Rules Search Page Searching for Rules
» Viewing Rule Details Configure the UMS Driver
» Modifying the Rules General Information
» Working with Scores and Weights ActivateDisable Rule
» Deleting Rules Configure the UMS Driver
» Searching Conditions Configure the UMS Driver
» Importing Conditions Configure the UMS Driver
» In the Search Results table, click the name of the rule. The Rule Details page
» Viewing the Condition Details of a Rule
» In the Navigation tree, select Rules. The Rules Search page is displayed.
» Exporting a Condition Configure the UMS Driver
» Editing Conditions Configure the UMS Driver
» Changing the Order of Conditions in a Rule
» Deleting Conditions Configure the UMS Driver
» Deleting Conditions from a Rule
» Create a new user group named BLC: exception users.
» Select existing User IDs to add to the BLC: exception users group.
» Click Import Policy in the Policies Search page. The Import Policy screen is
» Click Browse and search for PreAuth_Block_policy.zip.
» Click OK to upload PreAuth_Block_policy.zip.
» In the Policy Search page, verify that the policy appears in the Search Results
» In the Navigation tree, double-click Policies.
» In the Policies Search page, click the New Policy button.
» For Policy Name, enter KBA Challenge.
» For Description, enter a description for the KBA Challenge policy.
» For Checkpoint, select Post-Authentication.
» Click Apply. Configure the UMS Driver
» Click the Group Linking tab.
» For Run Mode, select All Users.
» In the Navigation tree, double-click Policies. The Policies Search page is
» In the Rules tab, click Add to add a new rule. Enter User Velocity as the rule name.
» In the Navigation tree, double-click Rules. The Rules Search page is displayed.
» Search for the Blacklisted countries rule.
» In the Search Results table, click Blacklisted countries. The Rule Details page for
» In the Search Results table, click System - Questions check. The Policy Details
» In the trigger combination, enter a description in the Description field.
» Click Apply. A confirmation dialog is displayed, saying that the policy details
» In the Navigation tree, select Patterns. The Patterns Search page is displayed.
» Click the New Pattern button.
» In the Navigation tree, double-click Groups. The Groups Search page is
» Click Add. Navigate to the Policies Search page.
» In the Results table, click the Post-Authentication policy. Click OK.
» In the parameters area, for Country in country group, select the Blacklisted Click Apply.
» Select Maximum from the Scoring Engine list. Click Apply. Click OK.
» Look through the policy descriptions in the Search Results table for ones that do
» Open the Fraud Cant Challenge policy to view its rules.
» In the Policy Details page, click Copy Policy.
» In the Copy Policy dialog, select Pre-Authentication as the checkpoint.
» Select Active or Disabled as the policy status.
» Click Copy. Use Case: Copy Policy
» In the Navigation tree, double-click Groups.
» In the Groups Search page, click the New Group button.
» In the Monitor IPs group page, click the IP tab.
» In the IP tab, click the Add button.
» In the Add IPs screen, select the Search and select from the existing IPs
» Forgot Password Flow Reset Password KBA-Challenge Flow
» OAAM Pre-Authentication OAAM AuthenticationPad
» OAAM Post-Authentication Security Oracle Fusion Middleware Online Documentation Library
» OAAM Predictive Analysis Oracle Fusion Middleware Online Documentation Library
» Auto-learning Pattern-Based Policy: OAAM Does User Have Profile
» Auto-learning Pattern-Based Policy: OAAM Users vs. Themselves
» Autolearning Pattern-Based Policy: OAAM Users vs. All Users
» OAAM Registration Oracle Fusion Middleware Online Documentation Library
» OAAM Challenge Oracle Fusion Middleware Online Documentation Library
» The administrator sees that Rule: WEBZIP used was triggered.
» OTP is set up for SMS and Email.
» The auto-learning policy OAAM does user have profile is disabled.
» The user is registered as testuser.
» His IP is in the Risky IP group.
» testuser tries to log in to the application.
» testuser is challenged via SMS.
» testuser answers incorrectly 3 times.
» testuser is challenged via KBA.
» testuser answers challenge question incorrectly 3 times.
» CSR must create a case and then unlock challenge questions for the user.
» testuser is able to log in to the application successfully.
» Use Case: Anonymizer IP - From the Group
» Group Usage OAAM Customer Care Ask Question
» User Flows OAAM Customer Care Ask Question
» Navigating to the Groups Search Page
Show more